The Anatomy of a Cyber Attack The preparation for
1 / 1

The Anatomy of a Cyber Attack The preparation for

Author : celsa-spraggs | Published Date : 2025-08-13

Description: The Anatomy of a Cyber Attack The preparation for A CyberAttack From Data gathering to implementation By The Oldcommguy The Anatomy of a CyberAttack CYBER WARFARE The Cyber World Areas of concern Cyber Espionage Cyber Warfare Cyber

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "The Anatomy of a Cyber Attack The preparation for" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Transcript:The Anatomy of a Cyber Attack The preparation for:
The Anatomy of a Cyber Attack The preparation for A Cyber-Attack From Data gathering to implementation By: The Oldcommguy® The Anatomy of a Cyber-Attack CYBER WARFARE The Cyber World Areas of concern Cyber Espionage Cyber Warfare Cyber Crime Cyber Terrorism Goals Cyber Knowledge Cyber Protection Recognition and Mitigation of attacks The Oldcommguy TM – All Rights Reserved 2014 Targets and Motives Corporate Types - DOS – SYN – ICMP – Port – DNS – Trojans #1 attack and access method – over 79% Thief – Personnel info Corporate info Defacement Takeover/control Financial (directly) Extortion Revenge Corporate or personnel image and reputation Individual/Personal – Yours and Family - entire Life ............. Governmental/Military Secrets Weapon Control Political, Religious…… The Oldcommguy TM – All Rights Reserved 2014 Goals of Cyber - attacks Money Power Control Publicity Revenge Crackers Learning Future protection/Penetration testing Or Just to do it! The Oldcommguy TM – All Rights Reserved 2014 Data and data sources , The Oldcommguy TM – All Rights Reserved 2014 Intelligence Intelligence is lots of data –small pieces add up Male/female Initials to real name Address Residence Work history Type of system used Weaknesses Where do you get data Social networks Stolen items –RFID’s, laptops, wallets, papers(trash) Shoulder surfing – looking over someone's back Phishing Personally from employee or target person, internal mole What is needed for a cyber attack The Oldcommguy TM – All Rights Reserved 2014 Goal – Reason for attack – end desire Intelligence Lots of data Information Five steps in an attack Reconnaissance Probing Actual attack Maintaining presence To continue original attack desired effect To allow for future attacks continued surveillance Light footing Covering attack track How it was done Access point Residual for future or continued access Information – many sources The Oldcommguy TM – All Rights Reserved 2014 Hooking the bones together! Small easily found data! Small things hook big part together Ligaments for human bones Data for the cyber anatomy of the target Little items lead to big information A family member A phone number A license plate House street, number Travel info Pet info, friends info….etc More small pieces of info – best place to eat The Oldcommguy TM – All Rights Reserved 2014 Data for Personal attack The Oldcommguy TM – All Rights Reserved 2014 The Eight piece puzzle for personal ID thief Full Name Including Spouse full info Address Current Last known Dependents and ages

Download Document

Here is the link to download the presentation.
"The Anatomy of a Cyber Attack The preparation for"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Presentations